Currently, scam tactics are becoming increasingly sophisticated. Scammers are exploiting the year-end/Lunar New Year period and utilizing technological methods to steal customers' information and assets.

 

The safety of your transactions is always Techcombank's top priority.Please remain vigilant and proactively protect yourself against fraud risks by familiarizing yourself with the latest scam methods. Simultaneously, please refer to Techcombank's fraud prevention solutions to protect your personal finances and ensure a safe online banking experience.

 

Latest scam methods

1. Year-end scam tactics

  • Impersonating banks/major brands: Announcing gifts, reward points, expiration of reward points, or service support (card locking, annual fee refunds, etc.) and requesting customers to download fake applications or click on links to fill in information
  • Sales scams: Offering unusually cheap flight tickets or Tet gift baskets and requiring advance transfers to reserve the goods.

 

2. Impersonating government authorities

  • Pretending to be from Tax authorities, Social Insurance, or Police to assist citizens with tax settlement, insurance payments, or integrating Land Use Rights Certificates into the National Population Database 
  • Request to download fake mobile applications (eTax, VssID, VNeID, etc.)

 

3. Scams via calendar apps and email:

Step 1: Scammers create event invitations via Calendar applications on iCloud, macOS, iOS, Gmail, Outlook, etc., containing fraudulent content asking the victim to call or access a link to verify or cancel a transaction.

Step 2: When the victim contacts the phone number in the email, the scammer impersonates support staff and uses psychological manipulation to request the victim to install malicious software to access their computer or phone.

Step 3: After stealing the information, the scammers perform acts such as: logging into bank accounts, contacting the victim's friends and family to defraud them, and misappropriating assets.

4. Scams via messaging/social networking Apps (Chat)

Step 1: The scammers exploit security vulnerabilities in messaging applications or online services (WhatsApp, iMessage, etc.) to gain unauthorized remote access to the victim's device.

Step 2: The scammers install malicious data onto the victim's device, take control of the device, and steal the victim's data.

Step 3: After stealing the information, the scammers perform acts such as: logging into bank accounts, contacting the victim's friends and family to defraud them, and misappropriating assets

 

Recommendations to help customers prevent frauds

Do’sDon’ts
  • Be highly vigilant against requests to click on links or install strange software of unknown origin
  • Install applications only from official app stores like Google Play and the App Store
  • Use antivirus software for mobile devices to enhance security and prevent external threats.
  • Set up biometric authentication (fingerprint/FaceID) to log in to devices, banking applications, and other payment apps.
  • Proactively update to new versions of software and operating systems provided by the device manufacturer to ensure the device always receives the latest security standards         
  • Absolutely do not click/access links sent by anyone or any third-party source without verifying the exact information of the contact person
  • Absolutely do not install any strange software/applications of unknown origin shared via files/links that cannot be found on the App Store/CH Play
  • Absolutely do not provide security information such as OTP codes, CVV codes, card numbers, or e-banking passwords to anyone under any circumstances, even if the individual claims to be a police officer or bank employee
  • Do not use devices that have been "jailbroken" or attempt to jailbreak your own device.

 

We hope you remain vigilant to protect your personal information and assets.

Sincerely, thank you for your cooperation and companionship!

 

If you need further information, please contact: